Category Archives: Identity

Delivering a new breed of patient access best practices requires an alignment of people, process, and technology

Learn how caregiver organizations on-board patients to improve how those patients perceive their total healthcare experience Continue reading

Posted in artificial intelligence, Business intelligence, Cloud computing, contact center, CRM, electronic medical records, Enterprise transformation, healthcare, Identity, machine learning, professional services, Security, supply chain, User experience | Tagged , , , , , , , , , , | Leave a comment

SambaSafety’s mission to reduce risk begins in its own datacenter security partnerships

Security and privacy protection increasingly go hand in hand, especially in sensitive industries like finance and public safety. For driver risk management software provider SambaSafety protecting their business customers from risk is core to their mission — and that begins … Continue reading

Posted in Bitdefender, Cloud computing, Cyber security, Enterprise architect, Identity, Information management, machine learning, Security, User experience | Tagged , , , , , , , , , , , , | Leave a comment

How MSP StoredTech brings comprehensive security services to diverse clients using Bitdefender

The choice of bedrock security technology can make or break managed service providers’ (MSPs’) ability to scale, grow rapidly while remaining efficient, and maintain top quality customer service. The next edition of BriefingsDirect explores how by simultaneously slashing security-related trouble … Continue reading

Posted in AIOps, artificial intelligence, Bitdefender, BYOD, Cloud computing, Cyber security, Identity, managed services, Security, User experience | Tagged , , , , , , , , , | Leave a comment

How healthcare providers are taking cues from consumer expectations to improve patient experiences

A discussion on how healthcare providers are employing processes and technologies from such industries as retail and financial services to vastly improve the experience and quality of care from the medical patients’ perspective. Continue reading

Posted in Business intelligence, Cloud computing, data analysis, electronic medical records, ERP, healthcare, Identity, Information management, machine learning, procurement, Security, supply chain, User experience | Tagged , , , , , , , , , , | Leave a comment

Data-driven and intelligent healthcare processes improve patient outcomes while making the IT increasingly invisible

A discussion on how healthcare providers employ new breeds of intelligent digital workspace technologies to improve doctor and patient experiences, make technology easier to use, and assist in bringing actionable knowledge resources to the integrated healthcare environment. Continue reading

Posted in application transformation, artificial intelligence, Business intelligence, Citrix, Cloud computing, data center, Data center transformation, electronic medical records, Enterprise architect, enterprise architecture, healthcare, Identity, Internet of Things, machine learning, Security, User experience, Virtualization | Tagged , , , , , , , , , , | Leave a comment

GDPR forces rekindling of people-centric approach to marketing

The next BriefingsDirect digital business innovation discussion explores how modern marketing is impacted by the General Data Protection Regulation (GDPR). Those seeking to know their customers well are finding that this sweeping new European Union (EU) law forces a dramatic shift in how … Continue reading

Posted in Ariba, artificial intelligence, big data, Business networks, Cloud computing, Cyber security, data analysis, Enterprise transformation, Identity, Information management, marketing, Networked economy, procurement, risk assessment, SAP, SAP Ariba, Security, supply chain, User experience | Tagged , , , , , , , , , , , , , , | Leave a comment

How a large Missouri medical center developed an agile healthcare infrastructure security strategy

Healthcare provider organizations are among the most challenging environments to develop and implement comprehensive and agile security infrastructures. These providers of healthcare are usually sprawling campuses with large ecosystems of practitioners, suppliers, and patient-facing facilities. They also operate under stringent … Continue reading

Posted in application transformation, Bitdefender, Citrix, Cloud computing, Cyber security, Data center transformation, disaster recovery, Help desk, Identity, Security, server, User experience, Virtualization, VMware | Tagged , , , , , , , , , , , , , | Leave a comment